Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

Posted on May 16, 2025May 16, 2025 By CWS

Might 16, 2025Ravie LakshmananHardware Safety / Vulnerability
Researchers at ETH Zürich have found yet one more safety flaw that they are saying impacts all fashionable Intel CPUs and causes them to leak delicate knowledge from reminiscence, exhibiting that the vulnerability referred to as Spectre continues to hang-out laptop techniques after greater than seven years.
The vulnerability, known as Department Privilege Injection (BPI), “could be exploited to misuse the prediction calculations of the CPU (central processing unit) as a way to achieve unauthorized entry to info from different processor customers,” ETH Zurich mentioned.
Kaveh Razavi, head of the Pc Safety Group (COMSEC) and one of many authors of the examine, mentioned the shortcoming impacts all Intel processors, doubtlessly enabling dangerous actors to learn the contents of the processor’s cache and the working reminiscence of one other person of the identical CPU.

The assault leverages what’s known as Department Predictor Race Circumstances (BPRC) that emerge when a processor switches between prediction calculations for 2 customers with completely different permissions, opening the door to a situation the place an unprivileged hacker may exploit it to bypass safety limitations and entry confidential info from a privileged course of.
Intel has issued microcode patches to handle the vulnerability, which has been assigned the CVE identifier CVE-2024-45332 (CVSS v4 rating: 5.7).
“Publicity of delicate info brought on by shared microarchitectural predictor state that influences transient execution within the oblique department predictors for some Intel Processors might enable an authenticated person to doubtlessly allow info disclosure through native entry,” Intel mentioned in an advisory launched on Might 13.
The disclosure comes as researchers from the Programs and Community Safety Group (VUSec) at Vrije Universiteit Amsterdam detailed a class of self-training Spectre v2 assaults codenamed Coaching Solo.
“Attackers can speculatively hijack management movement throughout the identical area (e.g., kernel) and leak secrets and techniques throughout privilege boundaries, re-enabling traditional Spectre v2 eventualities with out counting on highly effective sandboxed environments like eBPF,” VUSec mentioned.

The {hardware} exploits, tracked as CVE-2024-28956 and CVE-2025-24495, can be utilized in opposition to Intel CPUs to leak kernel reminiscence at as much as 17 Kb/s, with the examine discovering that they may “fully break the area isolation and re-enable conventional user-user, guest-guest, and even guest-host Spectre-v2 assaults.”

CVE-2024-28956 – Oblique Goal Choice (ITS), which impacts Intel Core Ninth-Eleventh, and Intel Xeon 2nd-Third, amongst others.
CVE-2025-24495 – Lion Cove BPU concern, which impacts Intel CPUs with Lion Cove core

Whereas Intel has shipped microcode updates for these defects, AMD mentioned it has revised its current steering on Spectre and Meltdown to explicitly spotlight the danger from using traditional Berkeley Packet Filter (cBPF).

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attacks, CPU, Enabling, Expose, Flaws, Intel, Leaks, Memory, Researchers, Spectre

Post navigation

Previous Post: Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
Next Post: FBI Warns of Deepfake Messages Impersonating Senior Officials

Related Posts

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers The Hacker News
6 Steps to 24/7 In-House SOC Success The Hacker News
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support The Hacker News
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News